Modern authentication schemes in smartphones and IoT devices: An empirical survey
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
A survey of detection methods for XSS attacks
Cross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web
applications since the early 2000s. It is a code injection attack on the client-side where an …
applications since the early 2000s. It is a code injection attack on the client-side where an …
Cross-site scripting (XSS) attacks and mitigation: A survey
The results of the Cisco 2018 Annual Security Report show that all analyzed web
applications have at least one vulnerability. It also shows that web attacks are becoming …
applications have at least one vulnerability. It also shows that web attacks are becoming …
[图书][B] Handbook of research on modern cryptographic solutions for computer and cyber security
B Gupta, DP Agrawal, S Yamaguchi - 2016 - books.google.com
Internet usage has become a facet of everyday life, especially as more technological
advances have made it easier to connect to the web from virtually anywhere in the …
advances have made it easier to connect to the web from virtually anywhere in the …
An OWASP top ten driven survey on web application protection methods
OB Fredj, O Cheikhrouhou, M Krichen… - Risks and Security of …, 2021 - Springer
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …
Machine Learning for Computer and Cyber Security
BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
[HTML][HTML] Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions
Abstract Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a
reputation for not only building Machine Learning (ML) models that rely on distributed …
reputation for not only building Machine Learning (ML) models that rely on distributed …
Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges
In this paper, we present comprehensive survey of secured web application by identifying
numerous serious threats faced by several-related organizations. Based on this, we have …
numerous serious threats faced by several-related organizations. Based on this, we have …
XGBXSS: an extreme gradient boosting detection framework for cross-site scripting attacks based on hybrid feature selection approach and parameters optimization
FMM Mokbal, W Dan, W Xiaoxi, Z Wenbin… - Journal of Information …, 2021 - Elsevier
With the widespread popularity of the Internet and the transformation of the world into a
global village, Web applications have been drawn increased attention over the years by …
global village, Web applications have been drawn increased attention over the years by …
Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud
This article presents a cloud-based framework that thwarts the DOM-based XSS
vulnerabilities caused due to the injection of advanced HTML5 attack vectors in the HTML5 …
vulnerabilities caused due to the injection of advanced HTML5 attack vectors in the HTML5 …